Coralogix supports the SCIM specification (System for Cross-Domain Identity Management), an open standard that allows you to automate user and group provisioning using a REST API.
SCIM lets you create users and groups in Coralogix and give them the proper level of access, as well as to remove access for users (de-provisioning) should they leave your organization or no longer need it.
Notes:
Supported Features
In Okta under Applications section press on Create App Integration and choose SAML 2.0
In General Settings App name will be used by Okta to display the name of the application to users, it can be anything.
In the next stage you will need to fill information the exists in Coralogix under Settings → Configure SAML.
Once done, press Next and then Finish in the last stage
After clicking Finish, scroll down to SAML Signing Certificate press on actions and in the dropdown choose View IdP metadata, copy the metadata into a text file and save it as .xml
Going back to the Coralogix SAML the configuration the file you just created must be uploaded by clicking on “Choose file” and picked from where it was saved.
After successfully uploading the configuration file a token can be generated by clicking on Generate Provisioning Token at the bottom of the page.
Go back to Okta and enable SCIM integration on the General tab, once enabled, the page will refresh with a new tab – Provisioning.
Go to newly added Provisioning tab and click Edit to configure SCIM integration.
Input the SCIM endpoint associated with your Coralogix domain.
Select Supported provisioning actions as displayed on the screenshot below
In Authentication Mode select HTTP Header and paste the Provisioning Token that was generated in Coralogix under HTTP Header – Authorization
Connection is completed.
In order to sync a group to Coralogix you will need to add the group under Assignments tab by clicking Assign to Group.
After assigning a group to the app, the group should be pushed to Coralogix by going to “Push Groups” tab and searching the group, after successfully pushing the group it will appear with green color as active
Checking the Groups in Coralogix, the new group (SCIM Test) should be visible in the list together with the existing groups.
Roles and Scope should be edited in Coralogix side under Groups per the relevant Okta group.
Sync using Okta cannot be supported as a custom attributes on groups sync via Push process is not implemented on Okta’s side.
For more information on how to assign Roles and Scope – look here.
Supported Features
Find our more here.
STEP 1. Create an application.
SCIM Provisioner with SAML (SCIM v2 Core)
from the Find Applications.STEP 2. Input the relevant Application and API Connection details.
STEP 3. Identify the Identity Provider Metadata by navigating to SSO > Issuer URL.
STEP 4. To use OneLogin roles as an group, add a rule to the app.
STEP 5. Enable automatic provisioning.
STEP 6. Validate configuration for testing your SAML SSO login. To do so, input the SCIM endpoint associated with your Coralogix domain.
This integration will push Azure Active Directory Users and Groups to Coralogix every 40 minutes. A Coralogix admin user needs to assign roles to the Groups on the Coralogix UI.
Or assign roles to a Group using the integration.
Supported features:
Admin
, User
, Read Only
, Data analyst
, Interface user
” to a group Active Directory Tenant URLs
Region | Coralogix Team Hostname | Tenant URL |
---|---|---|
US | https://ng-api-http.coralogix.us/scim | |
Europe | https://ng-api-http.coralogix.com/scim | |
Singapore | https://ng-api-http.coralogixsg.com/scim | |
India | https://ng-api-http.app.coralogix.in/scim | |
Stockholm | https://ng-api-http.eu2.coralogix.com/scim |